SwePub
Tyck till om SwePub Sök här!
Sök i SwePub databas

  Utökad sökning

Träfflista för sökning "WFRF:(Awad Ali Ismail) srt2:(2018)"

Sökning: WFRF:(Awad Ali Ismail) > (2018)

  • Resultat 1-8 av 8
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
1.
  •  
2.
  • Ali, Bako, et al. (författare)
  • Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes
  • 2018
  • Ingår i: Sensors. - : MDPI. - 1424-8220. ; 18:3
  • Tidskriftsartikel (refereegranskat)abstract
    • The Internet of Things (IoT) is an emerging paradigm focusing on the connection of devices, objects, or “things” to each other, to the Internet, and to users. IoT technology is anticipated to become an essential requirement in the development of smart homes, as it offers convenience and efficiency to home residents so that they can achieve better quality of life. Application of the IoT model to smart homes, by connecting objects to the Internet, poses new security and privacy challenges in terms of the confidentiality, authenticity, and integrity of the data sensed, collected, and exchanged by the IoT objects. These challenges make smart homes extremely vulnerable to different types of security attacks, resulting in IoT-based smart homes being insecure. Therefore, it is necessary to identify the possible security risks to develop a complete picture of the security status of smart homes. This article applies the operationally critical threat, asset, and vulnerability evaluation (OCTAVE) methodology, known as OCTAVE Allegro, to assess the security risks of smart homes. The OCTAVE Allegro method focuses on information assets and considers different information containers such as databases, physical papers, and humans. The key goals of this study are to highlight the various security vulnerabilities of IoT-based smart homes, to present the risks on home inhabitants, and to propose approaches to mitigating the identified risks. The research findings can be used as a foundation for improving the security requirements of IoT-based smart homes.
  •  
3.
  • Awad, Ali Ismail (författare)
  • Introduction to Information Security Foundations and Applications
  • 2018
  • Ingår i: Information Security. - : Institution of Engineering and Technology. - 9781849199742 - 9781849199766 ; , s. 3-9
  • Bokkapitel (refereegranskat)abstract
    • Information security has extended to include several research directions like user authentication and authorization, network security, hardware security, software security, and data cryptography. Information security has become a crucial need for protecting almost all information transaction applications. Security is considered as an important science discipline whose many multifaceted complexities deserve the synergy of the computer science and engineering communities.
  •  
4.
  • Elrawy, Mohamed Faisal, et al. (författare)
  • Intrusion detection systems for IoT-based smart environments : a survey
  • 2018
  • Ingår i: Journal of Cloud Computing. - : Springer. - 2192-113X. ; 7:21, s. 1-20
  • Tidskriftsartikel (refereegranskat)abstract
    • One of the goals of smart environments is to improve the quality of human life in terms of comfort and efficiency. The Internet of Things (IoT) paradigm has recently evolved into a technology for building smart environments. Security and privacy are considered key issues in any real-world smart environment based on the IoT model. The security vulnerabilities in IoT-based systems create security threats that affect smart environment applications. Thus, there is a crucial need for intrusion detection systems (IDSs) designed for IoT environments to mitigate IoT-related security attacks that exploit some of these security vulnerabilities. Due to the limited computing and storage capabilities of IoT devices and the specific protocols used, conventional IDSs may not be an option for IoT environments. This article presents a comprehensive survey of the latest IDSs designed for the IoT model, with a focus on the corresponding methods, features, and mechanisms. This article also provides deep insight into the IoT architecture, emerging security vulnerabilities, and their relation to the layers of the IoT architecture. This work demonstrates that despite previous studies regarding the design and implementation of IDSs for the IoT paradigm, developing efficient, reliable and robust IDSs for IoT-based smart environments is still a crucial task. Key considerations for the development of such IDSs are introduced as a future outlook at the end of this survey.
  •  
5.
  • Hassan, Abbas M., et al. (författare)
  • Urban Transition in the Era of the Internet of Things : Social Implications and Privacy Challenges
  • 2018
  • Ingår i: IEEE Access. - : IEEE. - 2169-3536. ; 6, s. 36428-36440
  • Tidskriftsartikel (refereegranskat)abstract
    • The Internet of Things (IoT) could become an important aspect of urban life in the next decade. In the IoT paradigm, various information and communication technologies (ICTs) are used in concert to substantially reduce urban problems. Smart cities and ubiquitous cities will adopt ICTs in the urban development process; however, IoT-based cities will experience considerably stronger effects than those that adopt conventional ICTs. IoT cities allow urban residents and “things”to be connected to the Internet by virtue of the extension of the Internet Protocol from IPv4 to IPv6 and of cutting-edge device and sensor technology. Therefore, the urban transition resulting from the influence of IoT may be a critical issue. The privacy-related vulnerabilities of IoT technologies may negatively affect city residents. Furthermore, disparities in the spread of IoT systems across different countries may allow some countries to subvert the privacy of other countries' citizens. The aim of this paper is to identify the potential prospects and privacy challenges that will emerge from IoT deployment in urban environments. This paper reviews the prospects of and barriers to IoT implementation at the regional, city, and residential scales from the perspectives of security and privacy. The IoT technology will be a continual presence in life in general and in urban life in particular. However, the adoption of the IoT paradigm in cities will be complicated due to the inherent presence of unsecured connections. Moreover, the IoT systems may rob people of some of their humanity, infringing on their privacy, because people are also regarded as “things”in the IoT paradigm. Given the social trepidation surrounding IoT implementation, local and international associations related to IoT privacy, and legislation and international laws, are needed to maintain the personal right to privacy and to satisfy the demands of institutional privacy in urban contexts.
  •  
6.
  • Information Security : Foundations, technologies and applications
  • 2018
  • Samlingsverk (redaktörskap) (refereegranskat)abstract
    • The rapid advancements in telecommunications, computing hardware and software, and data encryption, and the widespread use of electronic data processing and electronic business conducted through the Internet have led to a strong increase in information security threats. The latest advances in information security have increased practical deployments and scalability across a wide range of applications to better secure and protect our information systems and the information stored, processed and transmitted. This book outlines key emerging trends in information security from the foundations and technologies in biometrics, cybersecurity, and big data security to applications in hardware and embedded systems security, computer forensics, the Internet of Things security, and network security. Information Security: Foundations, technologies and applications is a comprehensive review of cutting-edge algorithms, technologies, and applications, and provides new insights into a range of fundamentally important topics in the field. This up-to-date body of knowledge is essential reading for researchers and advanced students in information security, and for professionals in sectors where information security is required.
  •  
7.
  • Khaled Abd-Ellah, Mahmoud, et al. (författare)
  • Two-phase multi-model automatic brain tumour diagnosis system from magnetic resonance images using convolutional neural networks
  • 2018
  • Ingår i: EURASIP Journal on Image and Video Processing. - : Springer. - 1687-5176 .- 1687-5281. ; 2018
  • Tidskriftsartikel (refereegranskat)abstract
    • Brain tumour is a serious disease, and the number of people who are dying due to brain tumours is increasing. Manual tumour diagnosis from magnetic resonance images (MRIs) is a time consuming process and is insufficient for accurately detecting, localizing, and classifying the tumour type. This research proposes a novel two-phase multi-model automatic diagnosis system for brain tumour detection and localization. In the first phase, the system structure consists of preprocessing, feature extraction using a convolutional neural network (CNN), and feature classification using the error-correcting output codes support vector machine (ECOC-SVM) approach. The purpose of the first system phase is to detect brain tumour by classifying the MRIs into normal and abnormal images. The aim of the second system phase is to localize the tumour within the abnormal MRIs using a fully designed five-layer region-based convolutional neural network (R-CNN). The performance of the first phase was assessed using three CNN models, namely, AlexNet, Visual Geometry Group (VGG)-16, and VGG-19, and a maximum detection accuracy of 99.55% was achieved with AlexNet using 349 images extracted from the standard Reference Image Database to Evaluate Response (RIDER) Neuro MRI database. The brain tumour localization phase was evaluated using 804 3D MRIs from the Brain Tumor Segmentation (BraTS) 2013 database, and a DICE score of 0.87 was achieved. The empirical work proved the outstanding performance of the proposed deep learning-based system in tumour detection compared to other non-deep-learning approaches in the literature. The obtained results also demonstrate the superiority of the proposed system concerning both tumour detection and localization.
  •  
8.
  • Munodawafa, Fortune, et al. (författare)
  • Security risk assessment within hybrid data centers : a case study of delay sensitive applications
  • 2018
  • Ingår i: Journal of Information Security and Applications. - : Elsevier. - 2214-2134 .- 2214-2126. ; 43, s. 61-72
  • Tidskriftsartikel (refereegranskat)abstract
    • Data centers are considered a critical form of infrastructure in today’s information society. They are at the core of the cloud computing and services revolution, which has changed the business models on how organizations deal with IT infrastructure costs. The hybrid data center architecture incorporates both legacy and fully virtualized infrastructures. On the one hand, the composite infrastructure has improved resource utilization and consolidation by adding flexibility and scalability factors, making the data center more cost effective and more agile. On the other hand, the hybrid infrastructure has imposed a new set of security challenges that need to be brought into focus. The lack of resource availability can be a great risk for delay sensitive applications such as voice over IP (VoIP) and online gaming when cloud computing is the deployment model. This study addresses the emerging risk problem by conducting a comprehensive security risk assessment using the NIST national vulnerability database (NVD) combined with EBIOS risk analysis and evaluation methodology. This study focuses on resource availability problem emanating from delay variations and queuing mechanisms in virtualized systems and its impact on delay sensitive applications. The study argues for the existence of availability risk within the hybrid data center infrastructure, which can deteriorate the performance of delay sensitive applications. Security remedial and countermeasures to the identified security risks are suggested in an extended discussion at the end of the study.
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 1-8 av 8

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy